Evolving security requirements in multi-layered Service-Oriented-Architectures

Idrees, Muhammad Sabir; Serme, Gabriel; Roudier, Yves; De Oliveira, Santana Anderson; Grall, Herve; Sudholt, Mario
SETOP 2011, 4th International Workshop on Autonomous and Spontaneous Security, in conjunction with the 16th annual European research event in Computer Security (ESORICS 2011) symposium, September 15-16, 2011, Leuven, Belgium / Also published in "Lecture Notes in Computer Science", 2012, Volume 7122/2012

Due to today's rapidly changing corporate environments,business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet Of Services, and the introduction of new security regulations (imposed by national and international regulatory bodies, such as SOX4 or BASEL5) are an important constraint in the design and development of business processes. In such a context, it is not sufficient to apply the corresponding adaptations only at the service orchestration or at the choreography level; there is also the need for controlling the impact of new security requirements to several architectural layers, specially in cloud computing, where the notion of Platforms as Services and Infrastructure as Services are fundamental. In this paper we survey several research questions related to security cross-domain and cross-layer security functionality in Service

Oriented Architectures, from an original point of view. We provide the first insights on how a general service model empowered with aspect oriented programming capabilities can provide clean modularization to such cross-cutting security concerns.


DOI
HAL
Type:
Conférence
City:
Leuven
Date:
2011-09-15
Department:
Sécurité numérique
Eurecom Ref:
3477
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in SETOP 2011, 4th International Workshop on Autonomous and Spontaneous Security, in conjunction with the 16th annual European research event in Computer Security (ESORICS 2011) symposium, September 15-16, 2011, Leuven, Belgium / Also published in "Lecture Notes in Computer Science", 2012, Volume 7122/2012
and is available at : http://dx.doi.org/10.1007/978-3-642-28879-1_13

PERMALINK : https://www.eurecom.fr/publication/3477